System Security Capstone

ITSC 310
Closed
SAIT
Calgary, Alberta, Canada
Work Integrated Learning Coordinator
(0)
3
Timeline
  • January 24, 2022
    Experience start
  • April 23, 2022
    Experience end
Experience
2/4 project matches
Dates set by experience
Preferred companies
Anywhere
Any
It & computing, Defense & security

Experience scope

Categories
Risk, audit and compliance Security (cybersecurity and IT security) Information technology Networking
Skills
project planning cyber security data analysis vulnerability analysis problem analysis
Student goals and capabilities

Is your organization looking to analyze or test systems' and applications' security? In this course, students from SAIT will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. Students will work in teams applying critical thinking, skills and knowledge learned in a two-year Information Systems Security program to develop a product of your choosing from concept to implementation.

Students

Students
Diploma
Any level
43 students
Project
150 hours per student
Students self-assign
Teams of 4
Expected outcomes and deliverables

Deliverables will vary depending on the scope of the project. It will be important to stick to the scope due to time limits and student abilities.

Project timeline
  • January 24, 2022
    Experience start
  • April 23, 2022
    Experience end

Project Examples

Requirements

Students will work in teams of 3-4 for 15 weeks and be able to synthesize theories and frameworks that can inform the understanding of your problem, analyze and test your organization technical architecture to identify vulnerabilities, prevent exploitation, and protect it against any security breach. Students have strong skills on coding, networking, vulnerability analysis, operating systems internals and exploitation, security policies, penetration testing, writing technical reports and basics on malware analysis, IoT and Wireless security.

At the end of the project the students will submit all their key findings and/or applications developed to your organization

Project examples include:

  • Identify systems and applications vulnerabilities and generate reports
  • Manage security incidents
  • Automate processes to detect vulnerabilities, prevent exploitation and attacks and mitigate risks
  • Networking and applications Penetration Testing
  • Assist with reviewing and creating cybersecurity policies
  • Design & deliver cybersecurity awareness training
  • Research & deliver a risk assessment for the organization
  • Analyze technical architecture of an organization and deliver a report on how to improve it to mitigate risks
  • Implement infrastructure and tools to logging and monitor systems to detect threats and protect the organization against system and data breaches

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

Be available for a quick phone call with the instructor to initiate your relationship and confirm your scope is an appropriate fit for the course.

Be available for the final presentation.

Be available to communicate with students to address project questions